Vulnerability Description
Untrusted search path vulnerability in pam_motd (aka the MOTD module) in libpam-modules before 1.1.3-2ubuntu2.1 on Ubuntu 11.10, before 1.1.2-2ubuntu8.4 on Ubuntu 11.04, before 1.1.1-4ubuntu2.4 on Ubuntu 10.10, before 1.1.1-2ubuntu5.4 on Ubuntu 10.04 LTS, and before 0.99.7.1-5ubuntu6.5 on Ubuntu 8.04 LTS, when using certain configurations such as "session optional pam_motd.so", allows local users to gain privileges by modifying the PATH environment variable to reference a malicious command, as demonstrated via uname.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Canonical | Libpam-Modules | 0.9.7 |
| Canonical | Ubuntu Linux | 8.04 |
References
- http://www.ubuntu.com/usn/USN-1237-1Vendor Advisory
- https://bugs.launchpad.net/ubuntu/%2Bsource/pam/%2Bbug/610125
- http://www.ubuntu.com/usn/USN-1237-1Vendor Advisory
- https://bugs.launchpad.net/ubuntu/%2Bsource/pam/%2Bbug/610125
FAQ
What is CVE-2011-3628?
CVE-2011-3628 is a vulnerability with a CVSS score of 6.9 (MEDIUM). Untrusted search path vulnerability in pam_motd (aka the MOTD module) in libpam-modules before 1.1.3-2ubuntu2.1 on Ubuntu 11.10, before 1.1.2-2ubuntu8.4 on Ubuntu 11.04, before 1.1.1-4ubuntu2.4 on Ubu...
How severe is CVE-2011-3628?
CVE-2011-3628 has been rated MEDIUM with a CVSS base score of 6.9/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2011-3628?
Check the references section above for vendor advisories and patch information. Affected products include: Canonical Libpam-Modules, Canonical Ubuntu Linux.